{"title":"通过V2X合作增强感知(PAC-V2X):安全问题和不当行为检测解决方案","authors":"Mohamed Hadded, O. Shagdar, Pierre Merdrignac","doi":"10.1109/IWCMC.2019.8766683","DOIUrl":null,"url":null,"abstract":"Cooperative Intelligent Transport System (C-ITS) also known as connected vehicle technology uses wireless technologies to enable real-time communication between vehicles moving along roads, traffic signals, infrastructure and other mobile devices. In order to boost the role of C-ITS in the domain of autonomous driving and smart mobility, the FUI French project PAC V2X (Perception Augmented by V2X Cooperation) proposes to enhance the vehicles perception in safety critical zones via a cooperation between the roadside infrastructure and the vehicles by relying on V2X communication and sensors. Several applications are considered in this project which require fundamentally new solutions for security, that differ from traditional security mechanisms such as PKI, signatures, encryption, etc. Indeed, a certified vehicle in PAC V2X can easily send false location information, alert incorrect event or report a bogus object. Therefore, new and innovative security approaches are needed to detect and report malicious activities, identify the misbehaving vehicles as well as react either by dropping the incorrect information or excluding the misbehaving vehicles from the network. In this paper, we target the PAC V2X use cases, we present attacker models and potential misbehavior detection mechanisms and a classification of these mechanisms.","PeriodicalId":363800,"journal":{"name":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Augmented Perception by V2X Cooperation (PAC-V2X): Security issues and misbehavior detection solutions\",\"authors\":\"Mohamed Hadded, O. Shagdar, Pierre Merdrignac\",\"doi\":\"10.1109/IWCMC.2019.8766683\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cooperative Intelligent Transport System (C-ITS) also known as connected vehicle technology uses wireless technologies to enable real-time communication between vehicles moving along roads, traffic signals, infrastructure and other mobile devices. In order to boost the role of C-ITS in the domain of autonomous driving and smart mobility, the FUI French project PAC V2X (Perception Augmented by V2X Cooperation) proposes to enhance the vehicles perception in safety critical zones via a cooperation between the roadside infrastructure and the vehicles by relying on V2X communication and sensors. Several applications are considered in this project which require fundamentally new solutions for security, that differ from traditional security mechanisms such as PKI, signatures, encryption, etc. Indeed, a certified vehicle in PAC V2X can easily send false location information, alert incorrect event or report a bogus object. Therefore, new and innovative security approaches are needed to detect and report malicious activities, identify the misbehaving vehicles as well as react either by dropping the incorrect information or excluding the misbehaving vehicles from the network. In this paper, we target the PAC V2X use cases, we present attacker models and potential misbehavior detection mechanisms and a classification of these mechanisms.\",\"PeriodicalId\":363800,\"journal\":{\"name\":\"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IWCMC.2019.8766683\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWCMC.2019.8766683","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Augmented Perception by V2X Cooperation (PAC-V2X): Security issues and misbehavior detection solutions
Cooperative Intelligent Transport System (C-ITS) also known as connected vehicle technology uses wireless technologies to enable real-time communication between vehicles moving along roads, traffic signals, infrastructure and other mobile devices. In order to boost the role of C-ITS in the domain of autonomous driving and smart mobility, the FUI French project PAC V2X (Perception Augmented by V2X Cooperation) proposes to enhance the vehicles perception in safety critical zones via a cooperation between the roadside infrastructure and the vehicles by relying on V2X communication and sensors. Several applications are considered in this project which require fundamentally new solutions for security, that differ from traditional security mechanisms such as PKI, signatures, encryption, etc. Indeed, a certified vehicle in PAC V2X can easily send false location information, alert incorrect event or report a bogus object. Therefore, new and innovative security approaches are needed to detect and report malicious activities, identify the misbehaving vehicles as well as react either by dropping the incorrect information or excluding the misbehaving vehicles from the network. In this paper, we target the PAC V2X use cases, we present attacker models and potential misbehavior detection mechanisms and a classification of these mechanisms.